Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
00dfc408880007275933567dc343ab0d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
00dfc408880007275933567dc343ab0d.exe
Resource
win10v2004-20231215-en
General
-
Target
00dfc408880007275933567dc343ab0d.exe
-
Size
120KB
-
MD5
00dfc408880007275933567dc343ab0d
-
SHA1
f8a23cdc8043c19cd3971df468154459684def59
-
SHA256
37aca0e15afb37c747d8ad9da34e53bf5e028e2c719cb66da79131114a44fd12
-
SHA512
e99c4d0d30f4a9609967aefd718fba1190f3cc49464d2ece93e7632a8ac35e71d85a1270d1c6924e06d565f8faf38931ef132ad65dc88d91d928c9a56e08101e
-
SSDEEP
1536:6TvMEQettA+M0KuPe+cq2+VbM5dtO2XhXTOkIHzEHPjzVddnSlv3Q:6bDA+Mp+P2Rs2R0HgHPjztS+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 00dfc408880007275933567dc343ab0d.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pikiz.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 pikiz.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 00dfc408880007275933567dc343ab0d.exe 2220 00dfc408880007275933567dc343ab0d.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /u" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /e" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /z" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /i" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /D" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /F" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /p" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /X" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /R" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /U" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /M" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /L" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /B" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /y" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /v" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /O" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /k" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /C" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /J" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /P" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /r" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /S" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /W" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /G" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /t" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /f" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /A" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /x" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /V" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /b" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /K" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /E" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /l" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /w" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /h" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /Q" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /j" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /m" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /N" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /q" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /s" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /g" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /Z" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /o" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /a" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /n" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /p" 00dfc408880007275933567dc343ab0d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /I" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /c" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /d" pikiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikiz = "C:\\Users\\Admin\\pikiz.exe /T" pikiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 00dfc408880007275933567dc343ab0d.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe 2952 pikiz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2220 00dfc408880007275933567dc343ab0d.exe 2952 pikiz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2952 2220 00dfc408880007275933567dc343ab0d.exe 28 PID 2220 wrote to memory of 2952 2220 00dfc408880007275933567dc343ab0d.exe 28 PID 2220 wrote to memory of 2952 2220 00dfc408880007275933567dc343ab0d.exe 28 PID 2220 wrote to memory of 2952 2220 00dfc408880007275933567dc343ab0d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00dfc408880007275933567dc343ab0d.exe"C:\Users\Admin\AppData\Local\Temp\00dfc408880007275933567dc343ab0d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\pikiz.exe"C:\Users\Admin\pikiz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD54157d602dadb022422963bdd36526c9a
SHA1bd16765a5a1d20ad9411b6cb53c168b9a357794f
SHA256278b397f0701dd896313b75ae0735029cb995ba45c3e7b9a4a05f754add43a31
SHA5122a1425b5dce29ebaf61851486f29e42cdcf14bb72411b90354368e0f52853e277312ad4c1339f5f90716a5be73ed76be7affbccd84c4ea8beb1068a49d2c1794